Login / Signup
Using Backward Induction Techniques in (Timed) Security Protocols Verification.
Miroslaw Kurkowski
Olga Siedlecka-Lamch
Pawel Dudek
Published in:
CISIM (2013)
Keyphrases
</>
security protocols
cryptographic protocols
automated design
petri net
colored petri nets
cryptographic algorithms
authentication protocol
security properties
security services
artificial immune algorithm
key management
secure communication
model checking
formal verification
security mechanisms